WO2009155787A1 - 对终端进行认证的方法、系统及服务器 - Google Patents
对终端进行认证的方法、系统及服务器 Download PDFInfo
- Publication number
- WO2009155787A1 WO2009155787A1 PCT/CN2009/000701 CN2009000701W WO2009155787A1 WO 2009155787 A1 WO2009155787 A1 WO 2009155787A1 CN 2009000701 W CN2009000701 W CN 2009000701W WO 2009155787 A1 WO2009155787 A1 WO 2009155787A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- terminal
- authentication
- authentication data
- authentication request
- data
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
Definitions
- the present invention relates to data transmission technologies in the field of communications, and in particular, to a method, system and server for authenticating a terminal. Background technique
- the current access network needs to authenticate the legality of the terminal.
- the authentication process includes:
- the terminal sends an authentication request to the current access network, where the authentication request includes the username and password of the terminal.
- the current access network of the terminal forwards the authentication request to the home network of the terminal.
- the home network of the terminal authenticates the terminal by using the username and password in the authentication request, and returns the authentication result to the current access network of the terminal.
- the current access network considers that the terminal passes the authentication and provides the corresponding service to the terminal; otherwise, if the returned authentication result is that the terminal is an illegal user, the current The access network may refuse to provide corresponding services for the terminal.
- the home network of the terminal stores and transmits passwords in plain text, and only recognizes passwords in clear text; however, the current access network of the terminal utilizes certain encryption algorithms (such as Challenge Handshake Authentication Protocol). Protocol, CHAP)
- CHAP Challenge Handshake Authentication Protocol
- the current access network of the terminal After receiving the username and password sent by the terminal, the current access network of the terminal encrypts the password according to a certain encryption algorithm and sends it to the home network of the terminal. At this time, the home network of the terminal cannot correctly identify the authentication request. The password in , therefore, may return the wrong authentication result or not return the authentication result, so that the authentication process cannot be performed normally.
- the embodiment of the present invention provides a method, a system, and a server for authenticating a terminal, so as to solve the problem that the authentication process cannot be obtained because the authentication data of the terminal's home network and the current access network can be different in the prior art.
- An embodiment of the present invention provides a method for authenticating a terminal, including:
- the authentication information forwarding server receives an authentication request from the terminal, the authentication request including the terminal identification and the authentication data;
- the authentication information forwarding server processes the authentication data in the authentication request from the terminal in the form of authentication data that can be recognized by the home network of the terminal, and sends an authentication request including the processed authentication data to the home network of the terminal;
- the home network of the terminal authenticates the terminal according to the terminal identifier and the authentication data in the received authentication request, and returns an authentication result.
- An embodiment of the present invention provides a system for authenticating a terminal, including:
- the authentication information forwarding server is configured to receive an authentication request from the terminal, where the authentication request includes the terminal identifier and the authentication data, and the authentication data in the authentication request is in the form of the authentication data that can be identified by the home network of the terminal. Processing, and sending an authentication request including the processed authentication data;
- the home network server of the terminal is configured to receive an authentication request sent by the authentication information forwarding server, authenticate the terminal according to the terminal identifier and the authentication data in the received authentication request, and return the authentication result.
- An embodiment of the present invention provides an authentication information forwarding server, including:
- a receiving module configured to receive an authentication request from the terminal, where the authentication request includes a terminal identifier And certification data;
- a processing module configured to process the authentication data in the authentication request according to an authentication data that can be identified by a home network of the terminal;
- a sending module configured to send an authentication request that includes the processed authentication data to the home network of the terminal.
- the authentication information forwarding server processes the authentication data according to the requirements of the home network, and then sends the authentication data to the home network, so that The home network can correctly identify the authentication data, and obtain the authentication result according to the authentication data, and correctly perform the authentication process, and the current access network of the terminal can perform corresponding operations on the terminal according to the authentication result.
- FIG. 1 is a schematic flowchart of a method for authenticating a terminal according to an embodiment of the present invention
- FIG. 2 is a schematic diagram of a signaling flow when a terminal in a roaming state is visited in an embodiment of the present invention
- FIG. 3 is a schematic diagram of a signaling flow when a terminal in a roaming state is in an accessing manner according to an embodiment of the present invention
- a schematic diagram of a system structure for authenticating a terminal
- FIG. 5 is a schematic structural diagram of an authentication information forwarding server according to an embodiment of the present invention. detailed description
- the home network of the terminal and the area covered by the current access network may not overlap at all, may not partially overlap, or may completely overlap.
- the two network stores and the type of authentication data that can be identified are different.
- the authentication data refers to the data used by the terminal's home network to authenticate the terminal, including data such as passwords.
- the form of the authentication data includes: a plaintext form or an encrypted form according to a certain encryption algorithm.
- FIG. 1 is a schematic flowchart of a method for authenticating a terminal according to an embodiment of the present invention, where the method includes the following steps: Step 101: The authentication information forwarding server receives an authentication request from the terminal, where the authentication request includes the terminal identifier and the authentication data.
- the authentication information forwarding server saves the received terminal identifier and authentication data into the database, and simultaneously establishes a correspondence between the terminal identifier and the authentication data.
- the terminal identifier includes, but is not limited to, a user name of the terminal and the like for characterizing the identity of the terminal, and the authentication data includes, but is not limited to, a password, etc., for the home network of the terminal to judge the legality of the terminal. data.
- the server in the network may also be a server in the home network of the terminal, or may be an independent server capable of communicating with the current access network and the home network of the terminal.
- Step 102 The authentication information forwarding server processes the authentication data in the authentication request from the terminal according to the authentication data that the home network of the terminal can recognize, and sends an authentication request including the processed authentication data to the home of the terminal.
- the internet The internet.
- the authentication data to be processed by the authentication information forwarding server is in plain text. If the authentication data in the authentication request sent by the terminal is in plain text, the authentication information forwarding server may directly perform the received authentication data. If the authentication data in the authentication request sent by the terminal is not in the plain text format, the authentication information forwarding server needs to be able to identify the format of the authentication data, and can convert the format of the authentication data into a plaintext form, and then convert the file into a plaintext form. The subsequent authentication data is processed.
- Step 103 The home network of the terminal authenticates the terminal according to the received authentication request including the processed authentication data, and returns an authentication result. At this time, the authentication process ends, and the authentication result can be forwarded to the authentication information forwarding server. The current access network of the terminal.
- the current access network of the terminal may also receive the authentication request from the terminal, and the current access network of the terminal receives the authentication request from the terminal.
- the method includes the following two methods: The first method: The terminal sends an authentication request to the authentication information forwarding server, and after receiving the authentication request, the authentication information forwarding server forwards the authentication request to the current access network of the terminal. .
- the second method The terminal directly sends the authentication to the authentication information forwarding server and the current access network. Request.
- the authentication information forwarding server may be triggered by the current access network of the terminal to send an authentication request to the home network of the terminal. Therefore, between step 101 and step 102, the current access network of the terminal is received from the terminal. After the authentication request of the terminal, the information exchange may be performed with the authentication information forwarding server, and the authentication information forwarding server is triggered to send an authentication request to the home network of the terminal.
- the information interaction process includes the following two steps:
- Step 1 After the current access network of the terminal operates the authentication data in the received authentication request according to the set conditions, an authentication request including the authentication data that is operated according to the set condition is sent to the authentication information forwarding server.
- the setting condition may be determined according to the form of authentication data that can be stored and identified by the current access network of the terminal, for example, if the authentication data sent by the terminal is in a plain text form, and the current access network can store and identify the authentication.
- the data is also in the plain text format, and the setting condition may be that the authentication data in the received plaintext format is not processed; if the authentication data that can be stored and recognized by the current access network is in the form of being encrypted according to the CHAP encryption algorithm, the setting condition is set.
- the authentication data may be encrypted according to the CHAP encryption algorithm.
- the authentication data can be operated according to the set conditions.
- Step 2 After receiving the authentication request that is sent by the current access network of the terminal and including the authentication data that is operated according to the set condition, the authentication information forwarding server determines the terminal identifier from the terminal, and obtains an authentication request from the terminal according to the determined terminal identifier. The corresponding authentication data is determined.
- the content of the authentication request received from the terminal by the authentication information forwarding server is: terminal identifier "A", authentication data "123”; the content of the authentication request sent by the current access network of the terminal is: terminal identifier "A ", the authentication data "abc", where "abc” is obtained by operating "123” according to the set conditions.
- the authentication information forwarding server determines, according to the terminal identifier "A” in the authentication request sent by the current access network of the terminal, that the authentication data corresponding to the terminal identifier "A" in the authentication request from the terminal is "123". After the second step is performed, the authentication information forwarding server can perform the operation of step 102 according to the determined authentication data.
- the operations of the first step and the second step may not be performed.
- the authentication information forwarding server may be in the form of authentication data that can be identified by the home network of the terminal. And processing the authentication data in the authentication request from the terminal.
- the authentication information forwarding server needs to determine the form of the authentication data that the home network of the terminal can recognize.
- the determination manner may be various, including but not limited to:
- the terminal When the terminal sends an authentication request to the authentication information forwarding server, the terminal carries the information of the home network of the terminal;
- the authentication information forwarding server determines the home network of the terminal according to the terminal identifier in the authentication request sent by the terminal;
- the current access network of the terminal determines the home network of the terminal according to the terminal identifier in the authentication request from the terminal, and sends the information of the home network to the authentication information forwarding server.
- the authentication information forwarding server determines the home network of the terminal, according to the correspondence between the network and the authentication data form that the network can recognize, the authentication data form that the home network of the terminal can recognize is found, according to the home network of the found terminal.
- the authentication data from the terminal is processed correspondingly in the form of the identifiable authentication data.
- the correspondence between the network and the authentication data form that the network can recognize may be stored in the authentication information forwarding server, or may be stored in an independent entity capable of communicating with the authentication information forwarding server, and may also be saved in the current connection of the terminal. Into the network.
- the authentication request sent to the authentication information forwarding server may include only the terminal identifier, and the authentication information forwarding server may correspond to the terminal identifier and the authentication data according to the established and saved. After the relationship finds the corresponding authentication data, the subsequent authentication process is performed.
- the home network of the terminal and the current access network are two different networks.
- the situation is when the terminal is roaming.
- the method in the foregoing embodiment is further described below by taking the terminal in a roaming state as an example.
- FIG. 2 it is a schematic diagram of a signaling flow when a terminal is in a roaming state in the embodiment of the present invention.
- the current access network (ie, the visited network) of the terminal stores and identifies according to CHAP.
- the authentication information forwarding server may be composed of a roaming secondary portal server and an intermediate server provided by the roaming service provider, and the terminal currently requests to obtain WLAN service data.
- the flow of the embodiment of the present invention is as follows:
- Step 2001 When the terminal is in the roaming state, it detects, associates with the access point (AP)/Authentication Controller (AC) of the visited place, and obtains an IP address.
- AP access point
- AC Authentication Controller
- Step 2002 The terminal sends the WLAN service request to the AC of the visited place, and the AC redirects the service request to the primary portal server of the visited place.
- Step 2003 The primary portal server of the visited site determines the home network of the terminal, and redirects the service request to the roaming secondary portal server.
- the first-level portal server of the visited site determines that the home network of the terminal may be actively determined according to information such as the identifier of the terminal, or may be that the terminal sends the information of the home network to the primary portal of the visited place after the terminal selects the home network. Server's.
- Step 2004 The roaming secondary portal server pushes the authentication page to the terminal.
- Step 2005 The terminal inputs the username and password in the authentication request through the authentication page.
- Step 2006 The roaming secondary portal server backs up the received username and password in clear text in the database.
- Step 2007 The roaming secondary portal server forwards the received authentication request to the primary portal server of the visited place.
- Step 2008 The first-level Portal server of the visited place sends a request to the AC of the visited place > Challenge (Challenge) information.
- Step 2009 The AC of the visited place sends the assigned Challenge information to the primary Portal server of the visited place.
- Step 2010 The first-level portal server of the visited place sends an authentication request to the AC of the visited place.
- Step 2012 The AAA server of the visited place forwards the authentication request containing the password after the encryption operation according to the CHAP encryption algorithm to the intermediate server.
- Step 2013 The intermediate server searches for the password in plain text corresponding to the user name from the user name and password information that has been backed up by the roaming secondary portal server based on the username in the authentication request that contains the password after the encryption operation.
- Step 2014 The intermediate server sends an authentication request containing the password in the clear text form to the home AAA server of the terminal.
- Step 2015 The home location of the terminal
- the AAA server authenticates the terminal according to the terminal user name and password in the received authentication request, and returns the authentication certificate to the intermediate server.
- the information returned at the same time may also have authorization information.
- Step 2016 The intermediate server returns the authentication result to the AAA server of the visited place.
- Step 2017 The AAA server of the visited area forwards the authentication result to the AC of the visited place, and the AC determines whether to allow the service request of the terminal according to the authentication result.
- the authentication process of the terminal in the roaming state is completed through the above-mentioned 17 steps, and in the step 2018 to the step 2020, the AC of the visited place can also push the terminal to the terminal through the visited primary portal server and the roaming secondary portal server.
- FIG. 3 it is a schematic diagram of a signaling flow when a terminal is in an international roaming state, in the embodiment of the present invention.
- a current access network ie, a visited network
- the plaintext authentication data the home network of the terminal (ie, the home network) stores and identifies the authentication data encrypted according to the CHAP encryption algorithm, and the information forwarding between the visited network and the home network is implemented by the authentication information forwarding server.
- the authentication information forwarding server may be composed of a roaming secondary portal server and an intermediate server provided by the roaming service provider, and the terminal currently requests to obtain WLAN service data.
- Steps 3001 to 3007 in this embodiment are the same as steps 2001 to 2007 in the foregoing embodiment. Since the visited network identifies the PAP plaintext authentication data in this embodiment, it is not required to be executed. Steps 2008 and 2009, that is, step 3008 in this embodiment is the same as step 2010 in the above embodiment.
- Step 3009 The AC of the visited place sends an authentication request including the password in plain text to the AAA server of the visited place. Authentication request.
- Step 3011 The intermediate server encrypts the password in the authentication request forwarded by the visited AAA server according to the CHAP encryption algorithm according to the password form that the home network can recognize.
- Step 3012 The intermediate server sends an authentication request including the encrypted password to the home AAA server of the terminal.
- Step 3013 to step 3018 are the same as steps 2015 to 2020.
- Each server in the visited network involved in the above two embodiments may be referred to as a current access network server of the terminal, and each server in the home network may be referred to as a home network server of the terminal.
- the embodiment of the present invention provides a system for authenticating a terminal.
- the system includes an authentication information forwarding server 11 and a home network server 12 of the terminal, where: the authentication information forwarding server 11 is configured to receive from An authentication request of the terminal, where the authentication request includes the terminal identifier and the authentication data, and processes the authentication data in the authentication request according to the form of the authentication data that the home network of the terminal can identify, and sends the processing including The authentication request of the subsequent authentication data; the home network server 12 of the terminal is configured to receive the authentication request sent by the authentication information forwarding server 11, and authenticate the terminal according to the terminal identifier and the authentication data in the received authentication request, and Returns the certification result.
- the system further includes a current access network server 13 of the terminal, configured to receive the recognition from the terminal.
- the certificate request operates the authentication data in the authentication request in accordance with the setting conditions, and transmits an authentication request including the authentication data that has been operated according to the setting conditions to the authentication information forwarding server 11.
- the authentication information forwarding server 11 is further configured to establish and save a correspondence between the terminal identifier and the authentication data in the authentication request from the terminal, and after receiving the terminal identifier in the authentication request sent by the current access network server 13 of the terminal, And searching for the authentication data corresponding to the terminal identifier from the correspondence relationship.
- the embodiment of the present invention further provides an authentication information forwarding server, which may be the authentication information forwarding server in the foregoing embodiment.
- the server includes a receiving module 21, a processing module 22, and a sending module 23, where:
- the receiving module 21 is configured to receive an authentication request from the terminal, where the authentication request includes the terminal identifier and the authentication data.
- the processing module 22 is configured to: in the form of the authentication data that the home network of the terminal can identify, in the authentication request.
- the receiving module 21 is further configured to receive an authentication request from a current access network of the terminal, where the authentication data in the authentication request is authentication data after the authentication data from the terminal is operated according to the set condition, the terminal identifier and the terminal identifier.
- the terminal identifier in the authentication request is the same.
- the processing module 22 further includes: a correspondence relationship establishing unit 31, a determining unit 32, a searching unit 33, and an executing unit 34, where: the correspondence relationship establishing unit 31 is configured to establish and save the terminal identifier and the authentication data in the authentication request from the terminal.
- the determining unit 32 is configured to determine the terminal identifier in the authentication request of the current access network from the terminal;
- the searching unit 33 is configured to find, according to the terminal identifier determined by the determining unit 32, the corresponding terminal identifier from the corresponding relationship.
- the execution unit 34 is configured to process the authentication data found by the searching unit 33 in the form of authentication data that can be recognized by the home network of the terminal.
- the processing module 22 is further configured to: determine a home network of the terminal; and find a form of authentication data that can be identified by the home network of the terminal according to a correspondence between the network and an authentication data form that the network can recognize;
- the authentication data in the authentication request is processed in the form of the authentication data that can be recognized by the home network of the terminal.
- the method, the system and the server for authenticating the terminal provided by the embodiment of the present invention can correctly perform the authentication process when the current access network of the terminal and the authentication data form that the home network can identify are different, and the current connection of the terminal is performed.
- the inbound network performs corresponding operations on the terminal according to the authentication result; in particular, when the terminal is in the roaming state, according to the solution provided by the embodiment of the present invention, the current access network of the terminal can correctly learn the legitimacy of the terminal, and can provide the terminal with
- the embodiment of the present invention has less transformation on the existing network system, lower transformation cost, and improves the stability of the device because the distributed adjustment of the network device is avoided.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Telephonic Communication Services (AREA)
Description
对终端进行认证的方法、 系统及服务器 技术领域
本发明涉及通信领域的数据传输技术, 尤其涉及一种对终端进行认证的 方法、 系统及服务器。 背景技术
在通信系统中, 当终端的当前接入网络不是该终端的家乡网络, 终端向 当前接入网络发起各种业务(如使用当前接入网络的无线局域网 (Wireless LAN, WLAN )业务)请求时, 当前接入网络都需要对该终端的合法性进行 认证, 该认证过程包括:
1、 终端向当前接入网络发送认证请求 , 该认证请求包含终端的用户名和 密码。
2、 终端的当前接入网络将该认证请求转发至该终端的家乡网络。
3、 该终端的家乡网络利用认证请求中的用户名和密码对该终端是否合法 进行认证, 并将认证结果返回给该终端的当前接入网络。
4、 如果返回的认证结果为该终端是合法用户, 则当前接入网络认为该终 端认证通过, 并向该终端提供相应的业务; 反之, 如果返回的认证结果为该 终端是非法用户, 则当前接入网络可以拒绝为该终端提供相应的业务。
在实际的通信过程中, 不同的网络存储的密码形式不同, 能够识别的密 码形式也不同。 如果终端的家乡网络和当前接入网络存储、 识别的密码形式 不同, 那么终端的家乡网络将不能正确识别接收到的由当前接入网络发送的 认证请求中的密码, 因此, 终端的认证过程将无法正常执行。 例如, 终端的 家乡网络采用明文形式对密码进行存储及发送, 并且也只能识别明文形式的 密码; 而终端的当前接入网络却是利用一定的加密算法(如挑战握手认证协 议 ( Challenge Handshake Authentication Protocol, CHAP )力口密算法)对密码 进行加密后存储及发送, 并且也只能识别以该加密算法加密后的密码。 在这
种情况下, 终端的当前接入网络接收到终端发送的用户名和密码后, 按照一 定的加密算法对密码进行加密后发送给终端的家乡网络, 此时, 终端的家乡 网络无法正确地识别认证请求中的密码, 因此, 4艮可能返回错误的认证结果 或者是不返回认证结果, 使认证过程无法正常执行。 发明内容
本发明实施例提供一种对终端进行认证的方法、 系统及服务器, 以解决 现有技术中存在的由于终端的家乡网络和当前接入网络分别能够识别的认证 数据的形式不同, 导致认证过程无法正常执行的问题。
本发明实施例提供一种对终端进行认证的方法, 包括:
认证信息转发服务器接收来自终端的认证请求, 该认证请求包含终端标 识和认证数据;
认证信息转发服务器按照终端的家乡网络能够识别的认证数据的形式, 对来自终端的认证请求中的所述认证数据进行处理, 并将包含处理后的认证 数据的认证请求发送给终端的家乡网络;
所述终端的家乡网络根据接收到的认证请求中的终端标识和认证数据对 所述终端进行认证, 并返回认证结果。
本发明实施例提供一种对终端进行认证的系统 , 包括:
认证信息转发服务器, 用于接收来自终端的认证请求, 所迷认证请求包 含终端标识和认证数据, 并按照所述终端的家乡网络能够识别的认证数据的 形式, 对所述认证请求中的认证数据进行处理, 并发送包含处理后的认证数 据的认证请求;
终端的家乡网络服务器, 用于接收认证信息转发服务器发送的认证请求, 根据接收到的认证请求中的终端标识和认证数据对所述终端进行认证, 并返 回认证结果。
本发明实施例提供一种认证信息转发服务器, 包括:
接收模块, 用于接收来自终端的认证请求, 所述认证请求包含终端标识
和认证数据;
处理模块, 用于按照所述终端的家乡网络能够识别的认证数据的形式, 对所述认证请求中的所述认证数据进行处理;
发送模块, 用于将包含处理后的认证数据的认证请求发送给所述终端的 家乡网络。
本发明实施例在终端的当前接入网络和终端的家乡网络之间能够识别的 认证数据的形式不同时, 由认证信息转发服务器将认证数据按照家乡网络的 要求进行处理后发送给家乡网络, 让家乡网络能够正确地识别认证数据, 并 根据认证数据得到认证结果, 正确地执行了认证过程, 则终端的当前接入网 络可以根据认证结果对终端执行相应的操作。 附图说明
图 1为本发明实施例中对终端进行认证的方法流程示意图;
图 2为本发明实施例中处于漫游状态的终端来访时的信令流程示意图; 图 3为本发明实施例中处于漫游状态的终端出访时的信令流程示意图; 图 4为本发明实施例中对终端进行认证的系统结构示意图;
图 5为本发明实施例中认证信息转发服务器的结构示意图。 具体实施方式
下面结合说明书附图对本发明实施例进行详细描述。
在本发明实施例中, 终端的家乡网络和当前接入网络所覆盖的区域可以 完全不重合, 可以部分不重合, 也可以完全重合, 这两个网络存储和能够识 别的认证数据的形式不同。 认证数据是指终端的家乡网络对终端进行认证时 使用的数据, 包括密码等数据。 认证数据的形式包括: 明文形式或者按照一 定加密算法加密后的形式。
如图 1 所示, 为本发明实施例中对终端进行认证的方法流程示意图, 所 述方法包括以下步骤:
步骤 101 : 认证信息转发服务器接收来自终端的认证请求, 该认证请求包 含终端标识和认证数据。
认证信息转发服务器将接收到的终端标识和认证数据保存到数据库中, 并同时建立所述终端标识和认证数据之间的对应关系。 所述终端标识包括但 不限于所述终端的用户名等用于表征该终端身份的信息, 所述认证数据包括 但不限于密码等用于让终端的家乡网络对该终端的合法性进行判断的数据。 中的服务器, 也可以是终端的家乡网络中的服务器, 还可以是能够与终端的 当前接入网络和家乡网络进行通信的独立的服务器。
步骤 102:认证信息转发服务器按照终端的家乡网络能够识别的认证数据 的形式, 对来自终端的认证请求中的认证数据进行处理, 并将包含处理后的 认证数据的认证请求发送给该终端的家乡网络。
在本步骤中, 认证信息转发服务器要处理的认证数据是明文形式的, 如 果终端发送的认证请求中的认证数据是明文形式的, 则此时认证信息转发服 务器可以直接对接收到的认证数据进行处理; 如果终端发送的认证请求中的 认证数据不是明文形式的, 则认证信息转发服务器需要能够识别该认证数据 的形式, 并能够将该认证数据的形式转换为明文形式, 再对转换为明文形式 后的认证数据进行处理。
步骤 103:该终端的家乡网络根据接收到的所述包含处理后的认证数据的 认证请求对终端进行认证, 并返回认证结果, 此时一次认证过程结束, 认证 结果可以通过认证信息转发服务器转发给终端的当前接入网络。
在本实施例中的步骤 102之前, 除了认证信息转发服务器接收来自终端 的认证请求外, 终端的当前接入网络也可以接收来自终端的认证请求, 终端 的当前接入网络接收来自终端的认证请求的方法包括但不限于以下两种: 第一种方法: 终端向认证信息转发服务器发送认证请求, 该认证信息转 发服务器接收到所述认证请求后, 将该认证请求转发给终端的当前接入网络。
第二种方法: 终端直接向认证信息转发服务器和当前接入网络发送认证
请求。
在实际的认证过程中, 可以由终端的当前接入网络触发认证信息转发服 务器向终端的家乡网络发送认证请求, 因此, 在步骤 101和步骤 102之间, 终端的当前接入网络在接收到来自终端的认证请求后, 还可以与认证信息转 发服务器之间进行信息交互, 触发认证信息转发服务器向终端的家乡网络发 送认证请求, 该信息交互过程包括以下两步:
第一步: 终端的当前接入网络对接收到的认证请求中的认证数据按照设 定条件进行操作后, 将包含按照设定条件操作后的认证数据的认证请求发送 给认证信息转发服务器。
设定条件可以是根据终端的当前接入网络所能够存储和识别的认证数据 的形式确定的, 例如, 若终端发送的所述认证数据是明文形式, 且当前接入 网络能够存储和识别的认证数据也是明文形式, 则设定条件可以是不对接收 到的明文形式的认证数据进行处理; 若当前接入网络能够存储和识别的认证 数据是按照 CHAP加密算法进行加密后的形式,则设定条件可以是按照 CHAP 加密算法对认证数据进行加密。
由于终端的当前接入网络不需要根据所述认证数据对终端的合法性进行 判断, 所以即使所述认证数据的形式是当前接入网络不能识别的也没有关系, 当前接入网络只要对接收到的认证数据按照设定条件进行操作即可。
第二步: 认证信息转发服务器接收到终端的当前接入网络发送的包含按 照设定条件操作后的认证数据的认证请求后, 从中确定终端标识, 并根据确 定的终端标识从来自终端的认证请求中确定出对应的认证数据。
例如: 认证信息转发服务器接收到的来自终端的认证请求中的内容为: 终端标识 "A", 认证数据 " 123" ; 终端的当前接入网络发送的认证请求中的 内容为: 终端标识 "A", 认证数据 "abc" , 其中, "abc" 是将 "123" 按照设 定条件操作后获得的。 认证信息转发服务器根据终端的当前接入网络发送的 认证请求中的终端标识 "A" , 确定该终端标识 "A" 在来自终端的认证请求 中对应的认证数据是 "123"。
在执行完上述第二步后, 认证信息转发服务器就可以根据确定的认证数 据执行步骤 102 的操作。 本发明实施例的方案中, 也可以不执行以上第一步 和第二步的操作, 由认证信息转发服务器接收到来自终端的认证请求后, 就 按照终端的家乡网络能够识别的认证数据的形式, 对来自终端的认证请求中 的所述认证数据进行处理。
在步骤 102 中, 认证信息转发服务器需要确定终端的家乡网络能够识别 的认证数据的形式, 该确定方式可以有多种, 包括但不限于:
1、 终端在向认证信息转发服务器发送认证请求时, 携带该终端的家乡网 络的信息;
2、 认证信息转发服务器根据终端发送的认证请求中的终端标识确定该终 端的家乡网络;
3、 终端的当前接入网络根据来自终端的认证请求中的终端标识确定该终 端的家乡网络, 并将该家乡网络的信息发送给认证信息转发服务器。
认证信息转发服务器确定终端的家乡网络后, 根据网络与该网络能够识 别的认证数据形式的对应关系, 查找出所述终端的家乡网络能够识别的认证 数据的形式, 根据查找出的终端的家乡网络能够识别的认证数据的形式对来 自终端的认证数据进行相应的处理。 这里的网络与该网络能够识别的认证数 据形式的对应关系可以保存在认证信息转发服务器中, 也可以保存在一个能 够与认证信息转发服务器进行通信的独立实体中, 还可以保存在终端的当前 接入网络中。
通过以上步骤 101至步骤 103的描述, 在终端的当前接入网络和家乡网 络分别能够存储和识别的认证数据的形式不同时, 实现了的认证过程的正常 执行。 进一步地, 当所述终端还需要再次发起认证时, 向认证信息转发服务 器发送的认证请求中可以只包含终端标识, 认证信息转发服务器可以在根据 建立并保存的终端标识和认证数据之间的对应关系查找出对应的认证数据 后, 执行后续的认证流程。
终端的家乡网络和当前接入网络是两个不同网络的情况有多种, 典型的
情况是终端处于漫游状态的情况。 下面以终端处于漫游状态为例, 对上述实 施例中的方法进行进一步地描述。
如图 2所示, 为本发明实施例中终端处于漫游状态来访时的信令流程示 意图, 在本实施例中, 终端的当前接入网络(即拜访地网络)存储和识別的 是按照 CHAP加密算法加密后的认证数据, 终端的家乡网络(即归属地网络) 存储和识别的是口令认证协议( Password Authentication Protocol, PAP ) 明文 认证数据, 拜访地网络和归属地网络之间的信息转发是通过认证信息转发服 务器实现的。 在本实施例中, 认证信息转发服务器可以由漫游服务商提供的 漫游二级入口 (Portal )服务器和中间服务器组成, 终端当前要求获取 WLAN 业务数据。 本发明实施例的流程如下:
步骤 2001 : 终端处于漫游状态时, 与拜访地的接入点(Access Point, AP ) /认证控制器(Authentication Controller, AC )进行探测、 关联, 并获取 IP地 址。
步骤 2002: 终端将 WLAN业务请求发送给拜访地的 AC, 并由该 AC将 该业务请求重定向至拜访地的一级 Portal服务器。
步骤 2003: 拜访地的一级 Portal服务器确定该终端的归属地网络, 并将 所述业务请求重定向至漫游二级 Portal服务器。
拜访地的一级 Portal服务器确定该终端的归属地网络可以是根据终端的 标识等信息主动确定的, 也可以是终端选择归属地网络后将该归属地网络的 信息发送给拜访地的一级 Portal服务器的。
步骤 2004: 漫游二级 Portal服务器向终端推送认证页面。
步骤 2005: 终端通过所述认证页面输入认证请求中的用户名和密码。 步骤 2006: 漫游二级 Portal服务器将接收到的用户名和密码以明文形式 备份在数据库中。
步骤 2007: 漫游二级 Portal服务器将接收到的认证请求转发给拜访地的 一级 Portal服务器。
步骤 2008: 拜访地的一级 Portal服务器向拜访地的 AC 发送请求>挑战
( Challenge ) 的信息。
步骤 2009: 拜访地的 AC 向拜访地的一级 Portal 服务器发送分配的 Challenge信息。
步骤 2010: 拜访地的一级 Portal服务器将认证请求发送给拜访地的 AC。 步骤 2011: 拜访地的 AC按照 CHAP加密算法对认证请求中的密码进行 加密, 并将包含加密操作后的密码的认证请求发送给拜访地的 AAA服务器。
步骤 2012: 拜访地的 AAA服务器向中间服务器转发包含已按照 CHAP 加密算法进行加密操作后的密码的认证请求。
步骤 2013: 中间服务器根据包含已进行加密操作后的密码的认证请求中 的用户名从漫游二级 Portal服务器已备份的用户名和密码信息中查找出该用 户名对应的明文形式的密码。
步骤 2014: 中间服务器将包含所述明文形式的密码的认证请求发送给终 端的归属地 AAA服务器。
步骤 2015: 终端的归属地 AAA服务器根据接收到的认证请求中的终端 用户名和密码对终端进行认证, 并向中间服务器返回认证结杲。
在本步骤中, 同时返回的还可以有授权信息。
步骤 2016: 中间服务器将认证结果返回给拜访地的 AAA服务器。
步骤 2017: 拜访地的 AAA服务器将认证结果转发给拜访地的 AC, 由 AC根据认证结果判断是否允许终端的业务请求。
通过以上 17步完成了终端在漫游状态中来访时的认证过程, 后续在步骤 2018至步骤 2020中, 还可以由拜访地的 AC通过拜访地的一级 Portal服务器 和漫游二级 Portal服务器向终端推送包含认证结果的页面。
如图 3 所示, 为本发明实施例中终端处于国际漫游状态出访时的信令流 程示意图, 在本实施例中, 假设终端的当前接入网络(即拜访地网络)存储 和识别的是 PAP明文认证数据, 终端的家乡网络(即归属地网络)存储和识 别的是按照 CHAP加密算法加密后的认证数据, 拜访地网络和归属地网络之 间的信息转发是通过认证信息转发服务器实现的, 同样地, 在本实施例中,
认证信息转发服务器可以由漫游服务商提供的漫游二级 Portal服务器和中间 服务器组成,终端当前要求获取 WLAN业务数据。本发明实施例的流程如下: 本实施例中的步骤 3001至步骤 3007与上述实施例中的步骤 2001至步骤 2007相同, 由于本实施例中拜访地网络识别的是 PAP明文认证数据, 因此无 需执行步骤 2008和步骤 2009, 也就是说本实施例中的步骤 3008与上述实施 例中的步骤 2010相同。
步骤 3009: 拜访地的 AC将包含明文形式的密码的认证请求发送给拜访 地的 AAA服务器。 认证请求。
步骤 3011 : 中间服务器按照归属地网络能够识别的密码形式, 将拜访地 的 AAA服务器转发的认证请求中的密码按照 CHAP加密算法进行加密。
步骤 3012: 中间服务器将包含已进行加密处理后的密码的认证请求发送 给终端的归属地 AAA服务器。
步骤 3013至步骤 3018与步骤 2015至步骤 2020相同。
在上述两个实施例中涉及的拜访地网络中的各服务器可以称为终端的当 前接入网络服务器, 归属地网络中的各服务器可以称为终端的家乡网络服务 器。
对应地, 本发明实施例提供一种对终端进行认证的系统, 如图 4所示, 该系统包括认证信息转发服务器 11和终端的家乡网络服务器 12, 其中: 认证 信息转发服务器 11用于接收来自终端的认证请求, 所述认证请求包含终端标 识和认证数据, 并按照所述终端的家乡网络能够识别的认证数据的形式, 对 所述认证请求中的所述认证数据进行处理, 并发送包含处理后的认证数据的 认证请求; 终端的家乡网络服务器 12用于接收认证信息转发服务器 11发送 的所述认证请求, 根据接收到的认证请求中的终端标识和认证数据对所述终 端进行认证, 并返回认证结果。
所述系统还包括终端的当前接入网络服务器 13, 用于接收来自终端的认
证请求, 对该认证请求中的认证数据按照设定条件进行操作, 并将包含按照 设定条件操作后的认证数据的认证请求发送给认证信息转发服务器 11。
所述认证信息转发服务器 11还用于建立并保存来自终端的认证请求中终 端标识和认证数据的对应关系, 并在接收到由终端的当前接入网络服务器 13 发送的认证请求中的终端标识后, 从所述对应关系中查找出该终端标识对应 的认证数据。
本发明实施例还提供一种认证信息转发服务器, 该服务器可以是上述实 施例中的认证信息转发服务器, 如图 5所示, 该服务器包括接收模块 21、 处 理模块 22和发送模块 23 , 其中: 接收模块 21用于接收来自终端的认证请求, 所述认证请求包含终端标识和认证数据; 处理模块 22用于按照所述终端的家 乡网络能够识别的认证数据的形式, 对所述认证请求中的所述认证数据进行 处理; 发送模块 23用于将包含处理后的认证数据的认证请求发送给所述终端 的家乡网络。
所述接收模块 21还用于接收来自终端的当前接入网络的认证请求, 该认 证请求中的认证数据是将来自终端的认证数据按照设定条件进行操作后的认 证数据, 终端标识与来自终端的认证请求中的终端标识相同。
所述处理模块 22进一步包括: 对应关系建立单元 31、 确定单元 32、 查 找单元 33和执行单元 34, 其中: 对应关系建立单元 31用于建立并保存来自 终端的认证请求中终端标识和认证数据的对应关系; 确定单元 32用于确定来 自终端的当前接入网络的认证请求中的终端标识; 查找单元 33用于根据确定 单元 32 确定的终端标识从所述对应关系中查找出该终端标识对应的认证数 据; 执行单元 34用于按照所述终端的家乡网络能够识别的认证数据的形式, 对查找单元 33查找出的认证数据进行处理。
所述处理模块 22进一步用于: 确定终端的家乡网络; 根据网络与该网络 能够识别的认证数据形式的对应关系, 查找出所述终端的家乡网络能够识别 的认证数据的形式; 根据查找出的所述终端的家乡网络能够识别的认证数据 的形式, 对所述认证请求中的认证数据进行相应的处理。
通过本发明实施例提供的对终端进行认证的方法、 系统及服务器, 在终 端的当前接入网络和家乡网络所能识别的认证数据形式不同时, 也能够正确 执行认证过程, 由终端的当前接入网络根据认证结果对终端执行相应的操作; 特别是在终端处于漫游状态时, 根据本发明实施例提供的方案, 能够让终端 的当前接入网络正确地获知终端的合法性, 能够为终端提供更好的业务; 另 外, 本发明实施例对现有的网络系统改造较小, 改造成本较低, 并且由于避 免了对网络设备的分布式调整, 因此提高了设备的稳定性。 发明的精神和范围。 这样, 倘若本发明的这些修改和变型属于本发明权利要 求及其等同技术的范围之内, 则本发明也意图包含这些改动和变型在内。
Claims
1、 一种对终端进行认证的方法, 其特征在于, 包括:
认证信息转发服务器接收来自终端的认证请求, 该认证请求包含终端标 识和认证数据;
认证信息转发服务器按照终端的家乡网络能够识别的认证数据的形式, 对来自终端的认证请求中的所述认证数据进行处理, 并将包含处理后的认证 数据的认证请求发送给终端的家乡网络;
所迷终端的家乡网络根据接收到的认证请求中的终端标识和认证数据对 所述终端进行认证, 并返回认证结果。
2、 如权利要求 1所述的方法, 其特征在于, 在认证信息转发服务器接收 到来自终端的认证请求时, 建立并保存该认证请求中终端标识和认证数据的 对应关系。
3、 如权利要求 2所述的方法, 其特征在于, 认证信息转发服务器对来自 终端的认证请求中的认证数据进行处理之前, 还包括:
终端的当前接入网络接收来自终端的认证请求;
对接收到的认证请求中的认证数据按照设定条件进行操作;
将包含按照设定条件操作后的认证数据的认证请求发送给认证信息转发 服务器。
4、 如权利要求 3所迷的方法, 其特征在于, 在终端的当前接入网络将包 含按照设定条件操作后的认证数据的认证请求发送给认证信息转发服务器之 还包括:
认证信息转发服务器确定接收到的由终端的当前接入网络发送的认证请 求中的终端标识;
根据确定的终端标识从保存的所述对应关系中查找出该终端标识对应的 认证数据。
5、 如权利要求 2所述的方法, 其特征在于, 所述终端的家乡网络返回认 证结果之后, 还包括:
认证信息转发服务器再次接收来自终端的认证请求, 该认证请求包含终 端标识;
根据保存的所述对应关系查找出再次接收到的认证请求中的终端标识对 应的认证数据;
对查找出的认证数据按照终端的家乡网络能够识别的认证数据的形式进 行处理, 并将包含处理后的认证数据的认证请求发送给终端的家乡网络。
6、 如权利要求 1所述的方法, 其特征在于, 所述来自终端的认证请求中 的认证数据的形式是明文形式, 或者所述来自终端的认证请求中的认证数据 的形式是认证信息转发服务器能够识别的形式, 并且认证信息转发服务器能 够将该认证数据的形式转换为明文形式。
7、 如权利要求 1所述的方法, 其特征在于, 所述认证信息转发服务器按 照终端的家乡网络能够识别的认证数据的形式, 对来自终端的认证请求中的 认证数据进行处理, 包括:
认证信息转发服务器确定终端的家乡网络;
根据网络与该网络能够识别的认证数据形式的对应关系, 查找出所述终 端的家乡网络能够识别的认证数据的形式;
根据查找出的所述终端的家乡网络能够识别的认证数据的形式, 对来自 终端的认证数据进行相应的处理。
8、 一种对终端进行认证的系统, 其特征在于, 包括:
认证信息转发服务器, 用于接收来自终端的认证请求, 所述认证请求包 含终端标识和认证数据, 并按照所述终端的家乡网络能够识别的认证数据的 形式, 对所述认证请求中的认证数据进行处理, 并发送包含处理后的认证数 据的认证请求;
终端的家乡网络服务器, 用于接收认证信息转发服务器发送的认证请求, 根据接收到的认证请求中的终端标识和认证数据对所述终端进行认证, 并返
回认证结果。
9、 如权利要求 8所述的系统, 其特征在于, 还包括:
终端的当前接入网络服务器, 用于接收来自终端的认证请求, 对该认证 请求中的认证数据按照设定条件进行操作, 并将包含按照设定条件操作后的 认证数据的认证请求发送给认证信息转发服务器。
10、 如权利要求 9所述的系统, 其特征在于,
所迷认证信息转发服务器, 还用于建立并保存来自终端的认证请求中终 端标识和认证数据的对应关系, 在接收到由终端的当前接入网络服务器发送 的认证请求中的终端标识后, 从所述对应关系中查找出该终端标识对应的认 证数据。
11、 一种认证信息转发服务器, 其特征在于, 包括:
接收模块, 用于接收来自终端的认证请求, 所述认证请求包含终端标识 和认证数据;
处理模块, 用于按照所述终端的家乡网络能够识别的认证数据的形式, 对所述认证请求中的所述认证数据进行处理; 家乡网络。
12、 如权利要求 11所述的认证信息转发服务器, 其特征在于,
所迷接收模块, 还用于接收来自终端的当前接入网络的认证请求, 该认 证请求中的认证数据是将来自终端的认证数据按照设定条件进行操作后的认 证数据, 终端标识与来自终端的认证请求中的终端标识相同。
13、 如权利要求 12所述的认证信息转发服务器, 其特征在于, 所述处理 模块包括:
对应关系建立单元, 用于建立并保存来自终端的认证请求中终端标识和 认证数据的对应关系;
确定单元, 用于确定来自终端的当前接入网络的认证请求中的终端标识; 查找单元, 用于根据确定单元确定的终端标识从所述对应关系中查找出
该终端标识对应的认证数据;
执行单元, 用于按照所述终端的家乡网络能够识别的认证数据的形式, 对查找单元查找出的认证数据进行处理。
14、 如权利要求 11所述的认证信息转发服务器, 其特征在于, 所述处理 模块进一步用于:
确定终端的家乡网络;
根据网络与该网络能够识别的认证数据形式的对应关系, 查找出所述终 端的家乡网络能够识别的认证数据的形式;
根据查找出的所述终端的家乡网络能够识别的认证数据的形式, 对所述 认证请求中的认证数据进行相应的处理。
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN200810115406A CN101616414A (zh) | 2008-06-23 | 2008-06-23 | 对终端进行认证的方法、系统及服务器 |
CN200810115406.9 | 2008-06-23 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2009155787A1 true WO2009155787A1 (zh) | 2009-12-30 |
Family
ID=41443989
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2009/000701 WO2009155787A1 (zh) | 2008-06-23 | 2009-06-23 | 对终端进行认证的方法、系统及服务器 |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN101616414A (zh) |
WO (1) | WO2009155787A1 (zh) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2017080333A1 (zh) * | 2015-11-13 | 2017-05-18 | 上海斐讯数据通信技术有限公司 | 上网认证方法、认证服务器及其所在认证系统 |
Families Citing this family (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102917354B (zh) * | 2011-08-03 | 2018-04-13 | 中兴通讯股份有限公司 | 一种接入方法、系统及移动智能接入点 |
CN102448061B (zh) * | 2011-11-18 | 2015-07-22 | 王黎明 | 一种基于移动终端防钓鱼攻击的方法和系统 |
CN103856933B (zh) * | 2012-11-30 | 2017-03-22 | 中国移动通信集团公司 | 一种漫游终端的认证方法、装置及服务器 |
CN103107985B (zh) * | 2012-12-04 | 2016-01-20 | 百度在线网络技术(北京)有限公司 | 一种云端认证方法、系统及装置 |
CN104333855B (zh) * | 2014-10-31 | 2018-04-27 | 北京思特奇信息技术股份有限公司 | 一种无线宽带认证漫游转发的方法及系统 |
CN106603461A (zh) * | 2015-10-14 | 2017-04-26 | 阿里巴巴集团控股有限公司 | 一种业务认证的方法、装置和系统 |
CN106790251B (zh) * | 2017-01-24 | 2020-05-05 | 中国联合网络通信集团有限公司 | 用户接入方法和用户接入系统 |
CN113312639A (zh) * | 2021-05-28 | 2021-08-27 | 广东电网有限责任公司广州供电局 | 基于标识加密算法的智能电网终端接入认证方法和系统 |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040073925A1 (en) * | 2002-09-27 | 2004-04-15 | Nec Corporation | Content delivery server with format conversion function |
CN1564516A (zh) * | 2004-03-26 | 2005-01-12 | 中兴通讯股份有限公司 | 一种无线局域网移动终端异地接入认证方法 |
CN1679309A (zh) * | 2002-04-22 | 2005-10-05 | 高通股份有限公司 | 用于接入网络认证的方法和装置 |
CN101018130A (zh) * | 2007-02-15 | 2007-08-15 | 物方恒德(北京)投资咨询有限公司 | 金融业务系统及金融业务处理方法 |
-
2008
- 2008-06-23 CN CN200810115406A patent/CN101616414A/zh active Pending
-
2009
- 2009-06-23 WO PCT/CN2009/000701 patent/WO2009155787A1/zh active Application Filing
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1679309A (zh) * | 2002-04-22 | 2005-10-05 | 高通股份有限公司 | 用于接入网络认证的方法和装置 |
US20040073925A1 (en) * | 2002-09-27 | 2004-04-15 | Nec Corporation | Content delivery server with format conversion function |
CN1564516A (zh) * | 2004-03-26 | 2005-01-12 | 中兴通讯股份有限公司 | 一种无线局域网移动终端异地接入认证方法 |
CN101018130A (zh) * | 2007-02-15 | 2007-08-15 | 物方恒德(北京)投资咨询有限公司 | 金融业务系统及金融业务处理方法 |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2017080333A1 (zh) * | 2015-11-13 | 2017-05-18 | 上海斐讯数据通信技术有限公司 | 上网认证方法、认证服务器及其所在认证系统 |
Also Published As
Publication number | Publication date |
---|---|
CN101616414A (zh) | 2009-12-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2009155787A1 (zh) | 对终端进行认证的方法、系统及服务器 | |
JP3869392B2 (ja) | 公衆無線lanサービスシステムにおけるユーザ認証方法および該方法をコンピュータで実行させるためのプログラムを記録した記録媒体 | |
US7760882B2 (en) | Systems and methods for mutual authentication of network nodes | |
JP4701172B2 (ja) | リダイレクトを使用してネットワークへのアクセスを制御するシステム及び方法 | |
JP4768720B2 (ja) | ネットワークにアクセスするユーザ端末に対してジェネリック認証アーキテクチャーを応用して管理する方法及びシステム | |
JP4643657B2 (ja) | 通信システムにおけるユーザ認証及び認可 | |
DK2924944T3 (en) | Presence authentication | |
WO2010000185A1 (zh) | 一种网络认证的方法、装置、系统及服务器 | |
WO2011017924A1 (zh) | 无线局域网的认证方法、系统、服务器和终端 | |
WO2012171184A1 (zh) | 基于mac地址的wlan认证方法和装置 | |
US20070165582A1 (en) | System and method for authenticating a wireless computing device | |
WO2008080351A1 (fr) | Procédé d'exploitation de réseau local sans fil basé sur une infrastructure d'authentification et de confidentialité de wlan (wapi) | |
WO2009074050A1 (fr) | Procede, systeme et appareil d'authentification de dispositif de point d'acces | |
WO2008000192A1 (fr) | Procédé d'accès au réseau de terminaux, système d'accès au réseau et équipement de passerelle | |
US20060046713A1 (en) | IPv6/IPv4 tunneling method | |
CN102185868B (zh) | 基于可扩展认证协议的认证方法、系统和设备 | |
WO2008098510A1 (fr) | Procédé et appareil d'acquisition d'informations de contrôleur d'accès dans un réseau local sans fil | |
WO2010069202A1 (zh) | 认证协商方法及系统、安全网关、家庭无线接入点 | |
WO2010105569A1 (zh) | 一种预认证方法、设备及系统 | |
CN112423299B (zh) | 一种基于身份认证进行无线接入的方法及系统 | |
WO2014161277A1 (zh) | 便携式wlan热点的连接方法及系统 | |
US20220247712A1 (en) | Communication system and method for performing third-party authentication between home service end and foreign service end | |
CN101568116B (zh) | 一种证书状态信息的获取方法及证书状态管理系统 | |
WO2015100874A1 (zh) | 家庭网关接入管理方法和系统 | |
WO2010102497A1 (zh) | 一种基于wapi的漫游认证和业务鉴权方法 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 09768712 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 09768712 Country of ref document: EP Kind code of ref document: A1 |